Math.pow(4, 1 / 2) returns __________.

a. 2
b. 2.0
c. 0
d. 1.0
e. 1


d Note that 1 / 2 is 0.

Computer Science & Information Technology

You might also like to view...

Since accessing an item in a sequence requires that all of its predecessor items (or successor items) be accessed first, a linked list is called a(n) ____ access data structure.

A. random B. direct C. ordered D. sequential

Computer Science & Information Technology

If the CPU Utilization statistics seem to be frozen at or near 100%, one or more applications might not be responding.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with a statement below.

A. People who work directly with data owners and are responsible for the storage, maintenance, and protection of the information. B. The quality or state of having value for some purpose or end. C. Enables authorized users to access information without interference or obstruction, and to receive it in the required format. D. A term meaning information is free from mistakes or errors and has the value that the end user expects it to have. E. People responsible for the security and use of a particular set of information. F. A term meaning information remains whole, complete, and uncorrupted. G. The protection of information from disclosure or exposure to unauthorized individuals or systems. H. End users who work with the information to perform their daily jobs supporting the mission of the organization, and who therefore share the responsibility for data security. I. A term referring to the quality or state of being genuine or original rather than a reproduction or fabrication.

Computer Science & Information Technology

The disaster recovery plan (DRP) is used to guide the re-creation of mission critical processes in the event of a disaster. Which of the following is a key element that is required as part of restoration planning to ensure that the most current version of the IT infrastructure is restored?

A. Service level agreements with contractors B. Troubleshooting guidelines C. Qualitative analysis risk report D. Updated configuration documentation

Computer Science & Information Technology